BHyPreC: a novel Bi-LSTM based hybrid recurrent neural network model to predict the CPU workload of cloud virtual machine
With the advancement of cloud computing technologies, there is an ever-increasing demand
for the maximum utilization of cloud resources. It increases the computing power …
for the maximum utilization of cloud resources. It increases the computing power …
Analytical review of data security in cloud computing
All the organization wants to implement the same security parameters as they are already
using with their internal data/resources. It is mandatory to understand and find the data …
using with their internal data/resources. It is mandatory to understand and find the data …
Data Privacy, Compliance, and Security in Cloud Computing for Finance
S Yalamati - Practical Applications of Data Processing, Algorithms …, 2024 - igi-global.com
In the rapidly evolving landscape of finance, where data integrity and security are
paramount, the adoption of cloud computing presents both opportunities and challenges …
paramount, the adoption of cloud computing presents both opportunities and challenges …
Educación financiera: Origen, análisis y evolución de las aportaciones científicas utilizando técnicas bibliométricas en la Web of Science
El desarrollo de las nuevas tecnologías de la información, así como el perfil de las nuevas
generaciones, han incentivado a las instituciones financieras a buscar una mayor inclusión …
generaciones, han incentivado a las instituciones financieras a buscar una mayor inclusión …
Information Leakage Techniques in Cloud Computing: A Review
G Saini, N Kaur - 2022 2nd International Conference on …, 2022 - ieeexplore.ieee.org
Cloud computing is referred as a model that facilitates universal, suitable and on-demand
network access for commonly used configurable computing resources having the ability of …
network access for commonly used configurable computing resources having the ability of …
Information security risks, benefits, and mitigation measures in cloud sourcing
This paper develops a categorization of cloud security risks, elaborates how they impact
information security, and discusses potential security benefits from cloud sourcing. This …
information security, and discusses potential security benefits from cloud sourcing. This …
Confidential VMs Explained: An Empirical Analysis of AMD SEV-SNP and Intel TDX
Confidential computing is gaining traction in the cloud, driven by the increasing security and
privacy concerns across various industries. Recent trusted hardware advancements …
privacy concerns across various industries. Recent trusted hardware advancements …
Enhancing Fraud Detection in Banking with Deep Learning: Graph Neural Networks and Autoencoders for Real-Time Credit Card Fraud Prevention
FK Alarfaj, S Shahzadi - IEEE Access, 2024 - ieeexplore.ieee.org
Under the umbrella of artificial intelligence (AI), deep learning enables systems to cluster
data and provide incredibly accurate results. This study explores deep learning for fraud …
data and provide incredibly accurate results. This study explores deep learning for fraud …
Analytics on real time security attacks in healthcare, retail and banking applications in the cloud
K Padmaja, R Seshadri - Evolutionary Intelligence, 2021 - Springer
Cloud computing is used by large enterprises to provide services to customers. The major
advantage of adapting cloud systems is that the clients need not have to manage the …
advantage of adapting cloud systems is that the clients need not have to manage the …
An improved cloud-based business process compliance management system using a user-centered approach
Despite the advantages of cloud services, businesses still face compliance challenges.
Some have withdrawn from cloud services due to the inability to adhere completely to …
Some have withdrawn from cloud services due to the inability to adhere completely to …